


default search action
Frontiers of Computer Science, Volume 7
Volume 7, Number 1, February 2013
- Jian Lin

, Li Zha, Zhiwei Xu:
Consolidated cluster systems for data centers in the cloud age: a survey and analysis. 1-19 - Weiwei Ni, Zhihong Chong, Hu Shu, Jiajia Bao, Aoying Zhou:

Evaluation of RDF queries via equivalence. 20-33 - Yue-hua Dai, Yi Shi, Yong Qi, Jianbao Ren, Peijian Wang:

Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. 34-43 - Botao Wang, Jingwei Qu, Xiaosong Wang, Guoren Wang, Masaru Kitsuregawa:

VGQ-Vor: extending virtual grid quadtree with Voronoi diagram for mobile k nearest neighbor queries over mobile objects. 44-54 - Yuming Wu, Xiaodong Luo, Zhen Yang:

Semantic separator learning and its applications in unsupervised Chinese text parsing. 55-68 - Lai Kang, Lingda Wu, Yee-Hong Yang:

A novel unsupervised approach for multilevel image clustering from unordered image collection. 69-82 - Jie Luo:

A general framework for computing maximal contractions. 83-94 - Jing Liu, Ziwei Liu, Jifeng He, Frédéric Mallet

, Zuohua Ding:
Hybrid MARTE statecharts. 95-108 - Wei Ke

, Zhiming Liu, Shuling Wang, Liang Zhao:
A graph-based generic type system for object-oriented programs. 109-134 - Yongjian Zhao, Hong He, Jian-Xun Mi

:
Noisy component extraction with reference. 135-144 - Xuejuan Zhang, Xiaochun Cao, Jingjie Li:

Geometric attack resistant image watermarking based on MSER. 145-156
Volume 7, Number 2, April 2013
- Jinchuan Chen, Yueguo Chen, Xiaoyong Du, Cuiping Li, Jiaheng Lu

, Suyun Zhao, Xuan Zhou:
Big data challenge: a data management perspective. 157-164 - Ling Liu:

Computing infrastructure for big data processing. 165-170 - Haixin Ma, Weining Qian, Fan Xia, Xiaofeng He, Jun Xu, Aoying Zhou:

Towards modeling popularity of microblogs. 171-184 - Rong-Hua Li, Jianquan Liu

, Jeffrey Xu Yu, Hanxiong Chen, Hiroyuki Kitagawa
:
Co-occurrence prediction in a large location-based social network. 185-194 - Biao Leng, Jiabei Zeng

, Zhang Xiong, Weifeng Lv, Yueliang Wan:
Probability tree based passenger flow prediction and its application to the Beijing subway system. 195-203 - R. Priscilla, S. Swamynathan:

A semi-supervised hierarchical approach: two-dimensional clustering of microarray gene expression data. 204-213 - Zheng Wang, Geguang Pu, Jianwen Li, Yuxiang Chen, Yongxin Zhao, Mingsong Chen, Bin Gu, Mengfei Yang, Jifeng He:

A novel requirement analysis approach for periodic control systems. 214-235 - Qin Shu, Zongyan Qiu, Shuling Wang:

Confinement framework for encapsulating objects. 236-256 - Bo Wang, Zhenjiang Hu, Qiang Sun, Haiyan Zhao, Yingfei Xiong

, Wei Zhang, Hong Mei:
Supporting feature model refinement with updatable view. 257-271 - Yu Zhou, Weiguo Zhang, Juan Li, Xinfeng Dong, Guozhen Xiao:

The autocorrelation distribution of balanced Boolean function. 272-278 - Zhiyuan Liu, Jun Pang, Chenyi Zhang

:
Design and formal verification of a CEM protocol with transparent TTP. 279-297 - Xianpeng Huangfu, Deke Guo, Honghui Chen, Xueshan Luo:

KMcube: the compound of Kautz digraph and Möbius cube. 298-306
Volume 7, Number 3, June 2013
- Yi Wang

, Renfa Li:
FPGA based unified architecture for public key and private key cryptosystems. 307-316 - Xiao Pan, Xiaofeng Meng:

Preserving location privacy without exact locations in mobile services. 317-340 - Nan Wu, HaiXing Hu, Fangmin Song, Huimin Zheng, Xiangdong Li:

Quantum software framework: a tentative study. 341-349 - Tao Song, Xiaolong Shi, Jinbang Xu:

Reversible spiking neural P systems. 350-358 - Qiang Qian, Songcan Chen:

Co-metric: a metric learning algorithm for data with multiple views. 359-369 - Savas Konur:

A survey on temporal logics for specifying and verifying real-time systems. 370-403 - Qinma Kang, Hong He:

Task assignment for minimizing application completion time using honeybee mating optimization. 404-415 - Amit Kumar Singh, Akash Kumar

, Jigang Wu, Thambipillai Srikanthan
:
CADSE: communication aware design space exploration for efficient run-time MPSoC management. 416-430 - Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai, Gang Yin:

An online service-oriented performance profiling tool for cloud computing systems. 431-445 - Zihou Wang, Yanni Han, Tao Lin, Yuemei Xu, Song Ci, Hui Tang:

Topology-aware virtual network embedding based on closeness centrality. 446-457
Volume 7, Number 4, August 2013
- Heng Wu, Wenbo Zhang, Jianhua Zhang, Jun Wei, Tao Huang:

A benefit-aware on-demand provisioning approach for multi-tier applications in cloud computing. 459-474 - Yuwei Wang, Yuanchun Zhou, Ying Liu, Ze Luo, Danhuai Guo, Jing Shao, Fei Tan, Liang Wu, Jianhui Li, Baoping Yan:

A grid-based clustering algorithm for wild bird distribution. 475-485 - Guozhi Song, Liying Yang, Jigang Wu, John A. Schormans:

Performance comparisons between cellular-only and cellular/WLAN integrated systems based on analytical models. 486-495 - Wei Li, Wei Zhang:

Multiple target localization in wireless visual sensor networks. 496-504 - Yujin Lim, Sanghyun Ahn:

Architecture for mobile group communication in campus environment. 505-513 - Song Wang, Seiichi Uchida

, Marcus Liwicki, Yaokai Feng:
Part-based methods for handwritten digit recognition. 514-525 - Yun Ye, Shengrong Gong, Chunping Liu, Jia Zeng, Ning Jia, Yi Zhang:

Online belief propagation algorithm for probabilistic latent semantic analysis. 526-535 - Wanpeng Li, Chunxiang Xu, Wenzheng Zhang, Shixiong Zhu, Xiujie Zhang:

New forward-secure signature schemes with untrusted update. 536-543 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:

A novel pairing-free certificateless authenticated key agreement protocol with provable security. 544-557 - Zhiyi Ma

, Xiao He
, Chao Liu:
Assessing the quality of metamodels. 558-570 - Mei Chen, Xiaolong Jin, Yuanzhuo Wang, Xueqi Cheng, Geyong Min:

Modelling priority queuing systems with varying service capacity. 571-582 - Weidong Min

, Ke Chen, Yongzhen Ke:
A matrix grammar approach for automatic distributed network resource management. 583-594
Volume 7, Number 5, October 2013
- Jean-Pierre Talpin:

Foreword to the special section on synchronous programming. 595-597 - Van Chan Ngo

, Jean-Pierre Talpin, Thierry Gautier, Paul Le Guernic, Loïc Besnard:
Formal verification of synchronous data-flow program transformations toward certified compilers. 598-616 - Kai Hu, Teng Zhang, Zhibin Yang:

Multi-threaded code generation from Signal program to OpenMP. 617-626 - Huafeng Yu

, Yue Ma, Thierry Gautier, Loïc Besnard, Jean-Pierre Talpin, Paul Le Guernic, Yves Sorel:
Exploring system architectures in AADL via Polychrony and SynDEx. 627-649 - Jean-Vivien Millo, Frédéric Mallet

, Anthony Coadou, S. Ramesh:
Scenario-based verification in presence of variability using a synchronous approach. 650-672 - Zhibin Yang, Jean-Paul Bodeveix, Mamoun Filali:

A comparative study of two formal semantics of the SIGNAL language. 673-693 - Wenjun Wu, Wei-Tek Tsai, Wei Li:

An evaluation framework for software crowdsourcing. 694-709 - Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao, Zongyan Qiu, Shengchao Qin

:
Algorithms for checking channel passing in web service choreography. 710-728 - Pablo Rabanal

, Ismael Rodríguez
, Fernando Rubio
:
An ACO-RFD hybrid method to solve NP-complete problems. 729-744 - Lishan Qiao, Limei Zhang, Songcan Chen:

Dimensionality reduction with adaptive graph. 745-753 - Kok-Lim Alvin Yau, Kae Hsiang Kwong, Chong Shen:

Reinforcement learning models for scheduling in wireless networks. 754-766 - Hunny Mehrotra, Banshidhar Majhi:

Local feature based retrieval approach for iris biometrics. 767-781 - R. Priya, T. N. Shanmugam:

A comprehensive review of significant researches on content based indexing and retrieval of visual information. 782-799
Volume 7, Number 6, December 2013
- Dongchen Jiang, Wei Li, Jie Luo, Yihua Lou, Zhengzhong Liao:

A decomposition based algorithm for maximal contractions. 801-811 - Dantong Ouyang, Xianji Cui, Yuxin Ye:

Integrity constraints in OWL ontologies based on grounded circumscription. 812-821 - Dunwei Gong, Yan Zhang:

Generating test data for both path coverage and fault detection using genetic algorithms. 822-837 - Chunping Liu, Yang Zheng, Shengrong Gong:

Image categorization using a semantic hierarchy model with sparse set of salient regions. 838-851 - Zengchang Qin, Tao Wan:

Hybrid Bayesian estimation tree learning with discrete and fuzzy labels. 852-863 - Ran Liu

, Wenjian Luo, Lihua Yue:
Classifying and clustering in negative databases. 864-874 - Rong Zhang, Koji Zettsu, Yutaka Kidawara, Yasushi Kiyoki, Aoying Zhou:

Context-sensitive Web service discovery over the bipartite graph model. 875-893 - Hadi Saboohi

, Sameem Abdul Kareem
:
An automatic subdigraph renovation plan for failure recovery of composite semantic Web services. 894-913 - Wenbing Jin, Feng Shi, Qiugui Song, Yang Zhang:

A novel architecture for ahead branch prediction. 914-923 - Chuang Lin, Yiping Deng, Yuming Jiang

:
On applying stochastic network calculus. 924-942 - Iftikhar Ahmed Khan, Willem-Paul Brinkman

, Robert M. Hierons
:
Towards estimating computer users' mood from interaction behaviour with keyboard and mouse. 943-954 - Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang, Wanpeng Li

:
Threshold public key encryption scheme resilient against continual leakage without random oracles. 955-968

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














